Featured posts
By Tafara Mlambo, Helen Arnell, Jason Feinberg, Bethany Newton, and Tanatswa Tuturu. Edith Cowan University. Data sovereignty is a term…
Criminals are emailing people and falsely claiming they have hacked into their computers or webcams and have access to compromising…
Cybersecurity company Fortinet released an advisory on CVE-2024-47575, a critical zero-day vulnerability impacting several versions of their FortiManager network management…
The Australian Computer Society (ACS) has today released the tenth edition of the ACS Digital Pulse report, presenting insights into…
We speak with Dina Mathers, Chief Information Security Officer, Carvana alongside Nick Mckenzie, Chief Information & Security Officer with Bugcrowd.…
Multiple agencies have released a joint Cybersecurity Advisory warning network defenders of Iranian cyber actors’ use of brute force and…
We speak with Craig Ford who has over 20+ year ICT and Cyber professional with experience in all three Blue…
Cyber-physical systems protection company Claroty has released new research highlighting the significant business impacts of cyber attacks affecting CPS environments.…
By Riccardo Galbiati, Regional Chief Security Officer, JAPAC, at Palo Alto Networks Integrating new technologies into existing industrial systems is…
Research by AI extended detection and response company Vectra has revealed growing distrust for threat detection tools as security operation…